Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Thursday October 29 2015, @10:41AM   Printer-friendly
from the backups-just-do-it dept.

There is a particularly devious type of malicious software that locks users out of their own computer systems until an individual agrees to pay a ransom to the hackers. In these cases, the FBI has surprisingly suggested just ponying up the dough.

It's not the type of advice one would typically expected from the FBI, but that's exactly what was recommended by Joseph Bonavolonta, the assistant special agent in charge of the FBI's CYBER and Counterintelligence Program Boston office.

"The ransomware is that good," said Bonavolonta at the 2015 Cyber Security Summit in Boston, as quoted by Security Ledger. "To be honest, we often advise people just to pay the ransom."

https://www.rt.com/usa/319913-fbi-pay-ransomware-hackers/?utm_source=rss&utm_medium=rss&utm_campaign=RSS

Yeah, it's RT, but I did a search, and that or similar headlines popped up on dozens of news sites. I clicked a couple of them, and the stories match. Try this one,
https://thehackernews.com/2015/10/fbi-ransomware-malware.html

Personally, I can almost certainly afford to nuke and reinstall, unless they get my RAID array. Then - I'd have to think hard.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Interesting) by danomac on Thursday October 29 2015, @10:46PM

    by danomac (979) on Thursday October 29 2015, @10:46PM (#256258)
    We were hit by this at work about a year ago.

    Someone clicked a bad link in an email and it installed this. It slowly, but surely, started going through the entire workstation encrypting everything it could see, including any network shares. However, it did not spread from there and we caught it relatively quickly.

    Our backups saved us for the most part. We did lose some files but none of them critical, things like temporary scratchpad spreadsheets and the like. The only reason our financial data were saved was because it was in use and so the malware couldn't encrypt it.

    Having snapshot backups meant we lost only a few hours of work. After that our spam filter was tweaked to not let through emails for services we actually use (they're used internally but never get sent an outside email.) Which is why we got burned... the phishing email came in was from a service we actually use. Well, used. We're moving away from that particular service now, but not because of the phishing attempt, too many other issues with it.
    Starting Score:    1  point
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3